Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66924: n/a

0
Medium
VulnerabilityCVE-2025-66924cvecve-2025-66924
Published: Wed Dec 17 2025 (12/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

AI-Powered Analysis

AILast updated: 12/24/2025, 18:17:41 UTC

Technical Analysis

CVE-2025-66924 identifies a Cross-site Scripting (XSS) vulnerability in Open Source Point of Sale (POS) version 3.4.1, specifically within the Create/Update Item Kit(s) feature. This vulnerability arises due to insufficient sanitization of the 'name' parameter, which allows remote attackers to inject arbitrary JavaScript or HTML code. When a victim user interacts with a crafted input, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions within the POS interface. The CVSS 3.1 base score of 6.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, and it impacts confidentiality and integrity partially (C:L/I:L) but not availability (A:N). No patches or known exploits are currently available, indicating the vulnerability is newly disclosed. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. The vulnerability’s exploitation could be leveraged in targeted attacks against retail environments using this POS software, potentially enabling attackers to steal sensitive customer or transaction data or manipulate POS operations.

Potential Impact

For European organizations, particularly retailers using Open Source POS v3.4.1, this vulnerability poses a risk to customer data confidentiality and transaction integrity. Successful exploitation could allow attackers to hijack user sessions, steal credentials, or inject fraudulent transactions, undermining trust and causing financial losses. The impact is heightened in environments where POS terminals are accessible to multiple users or connected to broader enterprise networks. Additionally, regulatory compliance risks arise under GDPR due to potential exposure of personal data. The lack of availability impact means business operations may continue uninterrupted, but the integrity and confidentiality breaches can have long-term reputational and legal consequences. Since no known exploits exist yet, organizations have a window to implement mitigations before active attacks emerge.

Mitigation Recommendations

Organizations should immediately implement strict input validation and output encoding on the 'name' parameter within the Create/Update Item Kit(s) functionality to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the POS web interface. Limit user privileges to reduce the risk of exploitation and monitor logs for unusual input patterns or error messages indicative of attempted XSS attacks. Conduct security awareness training to inform users about the risks of interacting with suspicious inputs. Where possible, isolate POS systems from general corporate networks and restrict internet access to reduce exposure. Since no official patch is available, consider applying virtual patching via Web Application Firewalls (WAFs) that detect and block malicious payloads targeting this parameter. Regularly check for updates from the Open Source POS project and apply patches promptly once released.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6942e8e71c1ff0913689279c

Added to database: 12/17/2025, 5:31:19 PM

Last enriched: 12/24/2025, 6:17:41 PM

Last updated: 2/5/2026, 2:03:29 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats